Quality of experience (QoE) is a multidimensional concept that has been in the focus of the research community for quite some time, especially after the rapid development of information and communication technology (ICT). It has been examined in many contexts (web, telecommunications, economy, medicine, etc.), for different media types (text, audio, video, augmented/virtual reality, etc.) and systems in various domains. Given that logistics and transport is a potent ICT-based domain for research activity in the future, in order to ease and improve the investigation of QoE in the contexts of logistics and transport, we aim to sum the recommendations and lessons learned for the investigation of QoE on the basis of our existing research. These suggestions cover how to treat the concept of QoE and relate it to other fields, techniques and environments to examine and treat QoE, as well as future technologies that need to be included. We provide insight into how these challenges can affect examination of QoE in logistics and transport and discuss ways to overcome them.
Big Data analytics and Artificial Intelligence (AI) technologies have become the focus of recent research due to the large amount of data. Dimensionality reduction techniques are recognized as an important step in these analyses. The multidimensional nature of Quality of Experience (QoE) is based on a set of Influence Factors (IFs) whose dimensionality is preferable to be higher due to better QoE prediction. As a consequence, dimensionality issues occur in QoE prediction models. This paper gives an overview of the used dimensionality reduction technique in QoE modeling and proposes modification and use of Active Subspaces Method (ASM) for dimensionality reduction. Proposed modified ASM (mASM) uses variance/standard deviation as a measure of function variability. A straightforward benefit of proposed modification is the possibility of its application in cases when discrete or categorical IFs are included. Application of modified ASM is not restricted to QoE modeling only. Obtained results show that QoE function is mostly flat for small variations of input IFs which is an additional motive to propose a modification of the standard version of ASM. This study proposes several metrics that can be used to compare different dimensionality reduction approaches. We prove that the percentage of function variability described by an appropriate linear combination(s) of input IFs is always greater or equal to the percentage that corresponds to the selection of input IF(s) when the reduction degree is the same. Thus, the proposed method and metrics are useful when optimizing the number of IFs for QoE prediction and a better understanding of IFs space in terms of QoE.
The fifth generation of mobile telecommunications (5G) is one of the most important novelties of our times due to its influence on the economy and society. The advent of 5G networks and services expands the security threats landscape and requires the implementation of adequate countermeasures. This paper presents a brief overview of 5G security threats and countermeasures from operators’ perspective. The aim is to contribute to the 5G cybersecurity knowledge collection and dissemination by summarizing the key findings and identifying next steps.
Digital transformation is unstoppable and ongoing process that affects all segments of our everyday lives such as healthcare, banking and finance systems, public administration, or postal and logistics systems. One of the main engines of this process, among many, is the use of cryptocurrencies. Both of these concepts are usually addressed from the firm perspective, but they should be considered from the individual’s perspective as well. Cryptocurrencies recently face increased cyber security threats, thereby affecting the digital transformation and posing additional challenges to it. Therefore, this paper gives a brief overview of security threats and challenges characteristic for cryptocurrency technology today and discusses what can be expected tomorrow. We provide insight how these challenges can affect digital transformation process and propose ways to increase the level of protection for both individuals and organizations.
Information-Communication Technologies (ICTs) are currently used in various fields and there are many amazing inventions that are already present and make communication and life easier for us on a daily basis. The use of ICTs is less represented in the social work institutions. Therefore, this paper presents the implementation of ICTs through the chatbot application for the needs of social work created on the Tidio platform and within the webpage of the Public Institution “Center for Social Work Tešanj”. The application facilitates the work of social workers in collecting information from the users and eases the aid received by the users of social care in terms of faster responses to inquiries during emergencies, such as the COVID-19 pandemic, but also after. For the purpose of this research, an end-user survey was created and conducted with the aim of collecting user opinions on the acceptance and motivation for the use of chatbots in social work institutions. The results showed good acceptance and usage motivation of social work chatbot.
Network traffic recognition serves as a basic condition for network operators to differentiate and prioritize traffic for a number of purposes, from guaranteeing the Quality of Service (QoS), to monitoring safety, as well as monitoring and detecting anomalies. Web Real-Time Communication (WebRTC) is an open-source project that enables real-time audio, video, and text communication among browsers. Since WebRTC does not include any characteristic pattern for semantically based traffic recognition, this paper proposes models for recognizing traffic generated during WebRTC audio and video communication based on statistical characteristics and usage of machine learning in Weka tool. Five classification algorithms have been used for model development, such as Naive Bayes, J48, Random Forest, REP tree, and Bayes Net. The results show that J48 and BayesNet have the best performances in this experimental case of WebRTC traffic recognition. Future work will be focused on comparison of a wide range of machine learning algorithms using a large enough dataset to improve the significance of the results.
The present review paper provides a systematic insight into the studies published so far when it comes to the research on the cost and performance optimisation in the parcel delivery phase. Globalisation, as well as the new trends, such as selling online, directly influences the demands for the delivery of goods. Demand for the delivery of goods proportionally affects the transport prices. A great majority of deliveries is carried out in densely populated urban areas. In terms of costs, the greatest part in the courier organisations costs is observed in the technological phase of parcel delivery, which is at the same time the least efficient. For that reason, significant improvement of performance and cost optimisation in the very delivery phase is a rather challenging field for the researchers. New algorithm-based technologies, innovations in the logistics and outsourcing of individual technological phases are ways by means of which one strives to enhance the delivery efficiency, to improve performance and quality, but also to optimise the costs in the last phase of delivery. The aim of the present paper is to offer a systematic review into the most recent research in the field of technology, innovations and outsourcing models with the aim of reducing the cost and enhancing the productivity and quality in parcel delivery.
Demographic data suggest a rapid aging trend in the active workforce. The concept of aging at work comes from the urgent requirement to help the aging workforce of the contemporary industries to maintain productivity while achieving a work and private life balance. While there is plenty of research focusing on the aging population, current research activities on policies covering the concept of aging at work are limited and conceptually different. This paper aims to review publications on aging at work, which could lead to the creation of a framework that targets governmental decision-makers, the non-governmental sector, the private sector, and all of those who are responsible for the formulation of policies on aging at work. In August 2019 we searched for peer-reviewed articles in English that were indexed in PubMed, IEEE Xplore, and Springer and published between 2008 and 2019. The keywords included the following phrases: “successful aging at work”, “active aging at work”, “healthy aging at work”, “productive aging at work”, and “older adults at work”. A total of 47,330 publications were found through database searching, and 25,187 publications were screened. Afterwards, 7756 screened publications were excluded from the further analysis, and a total of 17,431 article abstracts were evaluated for inclusion. Finally, further qualitative analysis included 1375 articles, of which about 24 are discussed in this article. The most prominent works suggest policies that encourage life-long learning, and a workforce that comprises both younger and older workers, as well as gradual retirement.
Voice over Internet Protocol (VoIP) is characterized by the growth of session control signalling, which is based on the Session Initiation Protocol (SIP). The growing amount of SIP signalling may cause an overload of VoIP session control infrastructure and quality of service degradation. To reduce the effect of overload conditions, we studied the impact of SIP message differentiation on the quality of VoIP session control procedures. We proposed an algorithm for SIP message prioritization and tested it with Kamailio SIP server under different conditions. Summarizing our research findings, the proposed algorithm improves the performance metrics related to VoIP session control procedures.
A lack of nurses in the Czech Republic is an issue that has been under discussion for several years. The aim of this paper is to analyze the lack and need of general nurses and midwives in the Hradec Kralove region where the shortage is higher than the national average. The used methods are quantitative research and structured interviews, to determine the number of nurses in healthcare institutions. The study uses data obtained from publicly available sources, i.e., Czech Statistical Office (CSO) and the National Institute of Education (NIE). The shortage of nurses in the Hradec Kralove region can be expected by 2030 to be in the range between 647.6 and 667.1 nurses while maintaining the existing conditions, that is, five times more than at present. In addition to the commonly considered measures that appear in the country’s strategies—such as improving the quality of conditions during studies and during employment, specifying or adjusting the role and competency of nurses and midwives in the healthcare system, or unifying employment standards— a focus on promoting the nursing profession can be recommended. Schools and ministries should be encouraged to focus on and invest in the promotion of this profession, so as to play a key role in recruiting new students for the nursing field of study at a time when the nursing profession is perceived positively, as an embodiment of solidarity and selflessness.
The Web of Things (WoT) is a technology concept that allows the integration of the Internet of Things (IoT) with the World Wide Web (WWW). It will vastly affect our lives in the near future given that it offers new services and applications via the well-known web window. In todays’ world where one can hardly imagine everyday life without access to various online services and applications via a plethora of devices, one can notice that technology has a huge impact on our day-to-day quality of living. That is why a user’s Quality of Experience (QoE) towards used technology in general plays a crucial role in their Quality of Life (QoL). Furthermore, security perception in terms of technology is the feature that vastly affects QoE and, consequently, QoL, as the number of security and privacy threats, risks, and vulnerabilities in cyber space, i.e., the technology environment that we increasingly use, is constantly rising. In order to reach the ultimate goals—the adoption of WoT technology and improvement of our QoL—we must know how this important aspect of security is so far addressed and analyzed. Therefore, this paper gives a comprehensive and structured analysis of the existing literature in this field through a proposed framework and provides an overview of research opportunities that should be addressed and elaborated in future investigations.
Nema pronađenih rezultata, molimo da izmjenite uslove pretrage i pokušate ponovo!
Ova stranica koristi kolačiće da bi vam pružila najbolje iskustvo
Saznaj više